ID CVE-2006-6676
Summary Integer overflow in the (a) OLE2 and (b) CHM parsers for ESET NOD32 Antivirus before 1.1743 allows remote attackers to execute arbitrary code via a crafted (1) .DOC or (2) .CAB file that triggers a heap-based buffer overflow. This vulnerability is addressed in the following product update: Eset Software, NOD32 Antivirus, 1.1743
References
Vulnerable Configurations
  • cpe:2.3:a:eset_software:nod32_antivirus:1.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:eset_software:nod32_antivirus:1.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:eset_software:nod32_antivirus:1.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:eset_software:nod32_antivirus:1.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:eset_software:nod32_antivirus:1.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:eset_software:nod32_antivirus:1.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:eset_software:nod32_antivirus:*:*:*:*:*:*:*:*
    cpe:2.3:a:eset_software:nod32_antivirus:*:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 17-10-2018 - 21:49)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
refmap via4
bid 21682
bugtraq
  • 20061220 NOD32 Antivirus DOC parsing Arbitrary Code Execution Advisory
  • 20061221 NOD32 Antivirus CAB parsing Arbitrary Code Execution Advisory
confirm http://eset.com/support/updates.php?pageno=63
secunia 23459
sreason 2079
vupen ADV-2006-5095
Last major update 17-10-2018 - 21:49
Published 21-12-2006 - 01:28
Last modified 17-10-2018 - 21:49
Back to Top